Researchers
Veinović, Mladen
Date issued - custom
| Issue Date | Title | Author(s) | Type | Мp-cat. |
|---|---|---|---|---|
| 2019 | Automated language-independent authorship verification (for Indo-European languages)![]() | Adamović, Saša | Article | 21M21 |
| 2018 | The potential for the use of EEG data in electronic assessments![]() | Antonijević, Miloš | Article | 24M24 |
| 2018 | An application of partial homomorphic encryption in computer system with limited resources![]() | Savic, Dejan | Article | 23M23 |
| 2018 | WIDE – centralized and collaborative approach to teaching Web development![]() | Jevremovic Aleksandar | Article | 22M22 |
| 2017 | IP Addressing: Problem-Based Learning Approach on Computer Networks![]() | Jevremović, Aleksandar | Article | Mp. category will be shown later |
| 2017 | Information-Theoretic Analysis of Iris Biometrics for Biometric Cryptography![]() | Adamović, Saša | Article | 23M23 |
| 2016 | Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics![]() | Adamović, Saša | Article | 22M22 |
| 2016 | RAX System to Rank Arabic XML Documents![]() | Elzentani, Hesham; Veinović, Mladen | Article | Mp. category will be shown later |
| 2016 | Advancement of True Random Number Generators Based on Sound Cards Through Utilization of a New Post-processing Method![]() | Nikolic, Slavisa; Veinović, Mladen | Article | 23M23 |
| 2016 | VirtualMeshLab: Virtual Laboratory for Teaching Wireless Mesh Network![]() | Jovanović, Nenad | Article | 22M22 |
| 2016 | Biometric Verification of Maternity and Identity Switch Prevention in Maternity Wards![]() | Komlen Lalović | Article | 23M23 |
| 2016 | Implementation of DNSSEC-Secured Name Servers for ni.rs Zone and Best Practices![]() | Antic, Djordje; Veinović, Mladen | Article | 51M51 |
| 2015 | A Novel Proactive Routing Protocol in Mobile Ad Hoc Networks![]() | Dejan Tepšić; Veinović, Mladen | Article | 23M23 |
| 2015 | Classification of MANET routing protocols![]() | Tepšić, Dejan M.; Veinović, Mladen | Article | 51M51 |
| 2015 | A new way of covert communication by steganography via JPEG images within a Microsoft Word document![]() | Uljarević, Dejan; Veinović, Mladen | Article | 22M22 |
| 2014 | Mousetracking visitors to evaluate efficacy of web site design![]() | Jevremović, Aleksandar | Article | 24M24 |
| 2014 | Information technologies in knowledge economy![]() | Đorđević Boljanović, Jelena | Article | 52M52 |
| 2014 | An Interactive and Collaborative Approach to Teaching Cryptology![]() | Adamović, Saša | Article | 21M21 |
| 2014 | Managing Semi-Structured Data Using XPath, XML Trees and Tree Tuples over a Wireless Network![]() | Hesham Elzentani; Veinović, Mladen | Article | Mp. category will be shown later |
| 2013 | Safety Assessment of Android Operating Systems![]() | Miroslav Ćajić; Bogdan Brkić; Šarac, Marko | Article | 23M23 |
